Royce Williams
1a162e2ab4
Clarify Blake2b label
2017-08-24 07:19:50 -08:00
jsteube
12d95fd22c
Added option --example-hashes to show an example hash for each hash-mode
2017-08-22 11:09:46 +02:00
jsteube
c8da13c3aa
Update default scrypt tmto to be ideal for latest NV and AMD top models
2017-08-17 17:46:54 +02:00
jsteube
cd5470f00e
Add missing benchmark salt length default for SIP mode
2017-08-17 12:13:47 +02:00
jsteube
92a288fbd3
Resolved merge conflict by incorporating both suggestions.
2017-08-17 12:12:03 +02:00
philsmd
0d6b9d0419
fixes #1313 : keep/print the original salt for descrypt hashes
2017-08-17 11:29:04 +02:00
philsmd
1d5dbab258
fixes #1278 : allow the '#' character within the username field of DCC2 hashes
2017-08-17 07:51:19 +02:00
jsteube
adacccecdf
Add pure kernels for FileZilla Server >= 0.9.55
2017-08-09 14:48:47 +02:00
jsteube
c8a645dc16
Fix invalid default salt length for mode 11000 in benchmark
2017-08-04 14:12:37 +02:00
jsteube
177800d1d0
Add pure kernels for RAdmin2
2017-08-03 15:21:39 +02:00
jsteube
a9375b9817
Fix maximum password length supported in MS Office <= 2003
2017-08-03 15:08:08 +02:00
jsteube
e0c86f40e5
Fix maximum password length supported in Lotus Notes/Domino 6
2017-08-03 14:33:31 +02:00
jsteube
1f42377931
Simplify Lotus Notes/Domino 5 kernel
2017-08-03 14:11:31 +02:00
jsteube
54eb0b158d
Prepare DNSSEC (NSEC3) optimized kernel for pure kernel version
2017-08-03 12:35:05 +02:00
jsteube
4626270a1e
Set maximum allowed password length for Sybase ASE to 30, according to documentation
2017-08-02 13:36:00 +02:00
jsteube
83d37ebeff
Add pure kernels for FortiGate (FortiOS)
2017-08-01 14:16:27 +02:00
jsteube
d573a73072
Use MIN() for setting pw_max
2017-08-01 10:23:14 +02:00
jsteube
03bb234045
Preparation for WPA/WPA2 AES-CMAC: works till PMK
2017-07-20 12:46:18 +02:00
jsteube
10d9918bb1
Remove password minimum length for -m 112 and -m 3100
2017-07-19 12:35:54 +02:00
jsteube
9e61928416
Fix some copy/paste error
2017-07-19 10:53:02 +02:00
jsteube
08a3fc2bb3
Enable automatic fallback to optimized kernel if pure kernel is not found
2017-07-18 20:32:56 +02:00
jsteube
beb6ee2061
Add OPTI_TYPE_OPTIMIZED_KERNEL
...
Rename unconverted fast hash kernels to optimized kernels
Finalize some converted fast hashes to default kernels
2017-07-18 14:45:15 +02:00
jsteube
fbea72ebd6
Renamed default kernels to optimized kernels
...
Renamed pure kernels to default kernels
Replaced long option --length-limit-disable with --optimized-kernel-enable
Replaced short option -L with -O
Set --optimized-kernel-enable to unset by default
2017-07-18 13:23:42 +02:00
jsteube
f87ac21065
Some small corrections on salt length for MD5-ASA
2017-07-17 20:25:08 +02:00
jsteube
945cf9be2f
md5($salt.$pass.$salt)
2017-07-17 17:24:32 +02:00
jsteube
9d92100a57
Move no-rules check to interface.c so that interface.c is the only source where pw_min and pw_max are set
2017-07-17 15:27:03 +02:00
jsteube
79bb69bcd4
Assign more official pw_min and pw_max values to related modes
2017-07-17 15:00:28 +02:00
jsteube
14fb0d5a17
Assign more official pw_min and pw_max values to related modes
2017-07-17 14:46:26 +02:00
jsteube
7e95700cd4
Assign more official pw_min and pw_max values to related modes
2017-07-17 14:33:51 +02:00
jsteube
2047625899
Update pw_min, pw_max, salt_min and salt_max switch cases to current development status
2017-07-17 13:48:33 +02:00
jsteube
1cd0212f73
Fix Cisco-PIX and Cisco-ASA pw_max as they limit themself to 16
2017-07-17 08:50:09 +02:00
jsteube
0e7bb074e6
Allow some oversized salt-length with dedicated kernels
2017-07-15 18:05:25 +02:00
jsteube
967d7b9323
Rename SALT_TYPE_INTERN to SALT_TYPE_GENERIC
2017-07-14 14:57:31 +02:00
jsteube
8e3153549f
Fix invalid use of SALT_MAX_OLD
2017-07-14 14:41:23 +02:00
jsteube
f70da8a04c
Increase salt length for salt of generic hash types
...
Remove --hex-salt support for non-generic hash types
2017-07-13 11:03:57 +02:00
jsteube
2c79d26778
Add -m 10700 pure kernel for -L support
2017-07-11 10:43:18 +02:00
jsteube
8a6e3a5275
Add support in HMAC for passwords larger than block size of the underlaying hash
2017-07-10 11:15:15 +02:00
jsteube
f619811b70
Remove PBKDF2-HMAC-MD5 includes password length limit
2017-07-09 23:53:53 +02:00
jsteube
97020f6521
Vectorized Ethereum Wallet + SCRYPT and added support for long passwords
2017-07-09 23:32:44 +02:00
jsteube
a91d048c04
Vectorized Ethereum Wallet, PBKDF2-HMAC-SHA256 and added support for long passwords
2017-07-09 23:10:28 +02:00
jsteube
25fba33901
Vectorized DPAPI masterkey file v1 and v2 and added support for long passwords
2017-07-09 23:05:14 +02:00
Jens Steube
ec7b416baf
Merge pull request #1291 from ZerBea/master
...
removed message-pair-check - no longer needed
2017-07-09 20:02:09 +02:00
jsteube
32329cf3f4
Vectorized Juniper/NetBSD sha1crypt and added support for long passwords
2017-07-09 20:01:45 +02:00
ZerBea
a6a732704f
removed message-pair-check - no longer needed
2017-07-09 19:54:08 +02:00
jsteube
de9d026bb0
Vectorized iTunes backup < 10.0 and added support for long passwords
2017-07-09 19:37:36 +02:00
jsteube
8f73d356f2
Vectorized LUKS and added support for long passwords
2017-07-09 19:24:34 +02:00
jsteube
1049fa386a
Add OPTI_TYPE_SLOW_HASH_SIMD_LOOP in interface.c where it was missing
2017-07-09 18:01:55 +02:00
jsteube
709cfa2e91
Added long passwords support for KeePass 1 (AES/Twofish) and KeePass 2 (AES)
2017-07-09 15:12:11 +02:00
jsteube
837b5a31d1
Added long passwords support for AxCrypt
2017-07-09 00:13:00 +02:00
jsteube
fc32b24236
Vectorized RAR5 and added support for long passwords
2017-07-08 23:55:56 +02:00
jsteube
933fa47d21
Vectorized Android FDE (Samsung DEK) and added support for long passwords
2017-07-08 21:56:36 +02:00
jsteube
edf904f309
Vectorized MS-AzureSync PBKDF2-HMAC-SHA256 and added support for long passwords
2017-07-08 21:39:15 +02:00
jsteube
af46a1560b
Vectorized Blockchain, My Wallet and added support for long passwords
2017-07-07 23:32:41 +02:00
jsteube
a1321d2d64
Added long passwords support for BSDi Crypt, Extended DES
2017-07-07 22:16:42 +02:00
jsteube
02ce227ff1
Vectorized Oracle T: Type (Oracle 12+) and added support for long passwords
2017-07-07 22:09:51 +02:00
jsteube
6e57aa1c0f
Vectorized eCryptfs and added support for long passwords
2017-07-07 21:46:41 +02:00
jsteube
eda88e6c84
Vectorized PBKDF2-HMAC-MD5 and added support for long passwords
2017-07-07 16:58:28 +02:00
jsteube
d3e6ae42f0
Added long passwords support for 7-Zip
2017-07-07 16:48:18 +02:00
jsteube
27a57383f0
Vectorized Password Safe v3 and added support for long passwords
2017-07-07 16:02:49 +02:00
jsteube
5de48182b4
Fixed max password length limit in mode 10500
2017-07-07 12:33:06 +02:00
jsteube
bedc481390
Added long passwords support for SAP CODVN H (PWDSALTEDHASH) iSSHA-1
2017-07-07 12:14:06 +02:00
jsteube
8916de538a
Vectorized MS Office 2013 and added support for long passwords
2017-07-07 10:38:05 +02:00
jsteube
51470b2b04
Vectorized MS Office 2010 and added support for long passwords
2017-07-07 10:03:59 +02:00
jsteube
61f39b37d2
Vectorized MS Office 2007 and added support for long passwords
2017-07-07 00:29:05 +02:00
jsteube
17b003b355
Vectorized Lotus Notes/Domino 8 and added support for long passwords
2017-07-06 14:57:28 +02:00
jsteube
cbd37ab587
Update some more modes to already converted modes with long password support
2017-07-06 14:39:05 +02:00
jsteube
df3890b49d
Added long passwords support for SCRYPT
2017-07-06 14:27:36 +02:00
jsteube
ccd85f345d
Vectorized 1Password, cloudkeychain and added support for long passwords
2017-07-06 14:11:33 +02:00
jsteube
6cbd2acd24
Added long passwords support for Drupal7
2017-07-06 11:02:43 +02:00
jsteube
8abd7ae9d1
Fix some old GCC compiler warnings
2017-07-06 10:35:25 +02:00
jsteube
819b53eb1d
Added long passwords support for sha256crypt $, SHA256 (Unix)
2017-07-05 13:43:14 +02:00
jsteube
7fec4f27d8
Vectorized OSX v10.8+ (PBKDF2-SHA512) and added support for long passwords
2017-07-05 13:01:55 +02:00
jsteube
195e3c744c
Vectorized TrueCrypt PBKDF2-HMAC-Whirlpool and added support for long passwords
2017-07-05 10:08:47 +02:00
jsteube
f2067d6962
Vectorized TrueCrypt PBKDF2-HMAC-RipeMD160 and added support for long passwords
2017-07-04 18:51:02 +02:00
jsteube
55874ec853
Vectorized VeraCrypt PBKDF2-HMAC-SHA256 and added support for long passwords
2017-07-04 15:40:34 +02:00
jsteube
907b065e00
Vectorized TrueCrypt PBKDF2-HMAC-SHA512 and added support for long passwords
2017-07-04 12:19:40 +02:00
jsteube
5eb76ccdde
Vectorized Password Safe v3 and added support for long passwords
2017-07-04 11:22:48 +02:00
jsteube
fc100a852b
Added hash-mode 2501 = WPA/WPA2 PMK
...
Fixes https://github.com/hashcat/hashcat/issues/1287
Limited hash-mode 2500 to max length 63
Fixes https://github.com/hashcat/hashcat/issues/1286
2017-07-03 16:11:57 +02:00
jsteube
1dfdefae69
Vectorized LastPass + LastPass sniffed kernel and added support for long passwords
2017-07-03 13:14:55 +02:00
jsteube
c3f0bb77dd
Vectorized AIX {ssha1} kernel and added support for long passwords
2017-07-03 13:06:59 +02:00
jsteube
2e78cf1d58
Vectorized 1Password, agilekeychain kernel and added support for long passwords
2017-07-03 13:00:42 +02:00
jsteube
a8a1fe1b4f
Vectorized AIX {ssha512} kernel and added support for long passwords
2017-07-03 12:44:03 +02:00
jsteube
113b8f672f
Comment some pw_min and pw_max ranges for better overview
2017-07-03 12:14:15 +02:00
jsteube
bb1341015f
Vectorized AIX {ssha256} kernel and added support for long passwords
2017-07-03 12:08:45 +02:00
jsteube
ccc9e46508
Vectorized Android FDE <= 4.3 kernel and added support for passwords up to length 256
2017-07-03 11:29:32 +02:00
jsteube
b149b87014
Update converted modules in interface.c
2017-07-01 14:50:39 +02:00
jsteube
52c1e15f3f
Move kernel-code for -L to standalone files with -pure suffix
2017-07-01 13:02:07 +02:00
jsteube
194af74e91
Add support for maximum bcrypt password length
2017-07-01 11:04:59 +02:00
jsteube
c3f374c733
Fix some maximum password length handling with --length-limit-disable feature
2017-06-30 17:28:19 +02:00
jsteube
f7a8e7c54b
Multiple changes:
...
* Added more preparations to support to crack passwords and salts up to length 256
* Added option --length-limit-disable to disable optimization based on password- and salt-length
* Added option --self-test-disable to disable self-test functionality on startup
2017-06-29 12:19:05 +02:00
jsteube
6fb79b726c
Respect the use of OPTI_TYPE_PRECOMPUTE_MERKLE in interface.c parser
2017-06-28 13:46:03 +02:00
jsteube
71d4926afa
Converted -m 400 to password length 256 support
...
Something weird happend here, read on!
I've expected some performance drop because this algorithm is using the password data itself inside the iteration loop.
That is different to PBKDF2, which I've converted in mode 2100 before and which did not show any performance as expected.
So after I've finished converting this kernel and testing everything works using the unit test, I did some benchmarks to see how much the
performance drop is.
On my 750ti, the speed dropped (minimal) from 981kH/s -> 948kH/s, that's mostly because of the SIMD support i had to drop.
If I'd turn off the SIMD support in the original, the drop would be even less, that us 967kH/s -> 948kH/s which is a bit of a more reasable
comparison in case we just want to rate the drop that is actually caused by the code change itself.
The drop was acceptable for me, so I've decided to check on my GTX1080.Now the weird thing: The performance increased from 6619kH/s to
7134kH/s!!
When I gave it a second thought, it turned out that:
1. The GTX1080 is a scalar GPU so it wont suffer from the drop of the SIMD code as the 750ti did
2. There's a change in how the global data (password) is read into the registers, it reads only that amount of data it actually needs by using
the pw_len information
3. I've added a barrier for CLK_GLOBAL_MEM_FENCE as it turned out to increase the performance in the 750ti
Note that this kernel is now branched into password length < 40 and larger.
There's a large drop on performance where SIMD is really important, for example CPU.
We could workaround this issue by sticking to SIMD inside the length < 40 branch, but I don't know yet how this can be done efficiently.
2017-06-22 13:49:15 +02:00
jsteube
83455817a7
Working example of password up to length 256 for mode 2100
2017-06-20 17:30:07 +02:00
jsteube
ad242c2f12
Working example of generic salt up to length 256 for mode 2100
2017-06-20 17:17:13 +02:00
jsteube
4174f06008
PoC using a length-independant MD4 hash processing in -m 2100
2017-06-18 23:31:40 +02:00
jsteube
a673aee037
Very hot commit, continue reading here:
...
This is a test commit using buffers large enough to handle both passwords and salts up to length 256.
It requires changes to the kernel code, which is not included in here.
It also requires some of the host code to be modified. Before we're going to modify kernel code to support the larger lengths I want to be
sure of:
1. Host code modification is ok (no overflows or underflows)
2. Passwords and Salts are printed correctly to status, outfile, show, left, etc.
3. Performance does not change (or only very minimal)
This is not a patch that supports actual cracking both passwords and salts up to length 256, but it can not fail anyway.
If if it does, there's no reason to continue to add support for both passwords and salts up to length 256.
2017-06-17 17:57:30 +02:00
jsteube
7905d79a28
Limit -m 2100 password length to 27 because if utf16
2017-06-16 23:17:56 +02:00
jsteube
c9caca2b0c
Increase max password length for DCC2 to 32
2017-06-16 19:28:55 +02:00
jsteube
d7e66996c9
Add support for self-test modes that use a binary hashfile (wpa, tc, vc, etc)
2017-06-14 14:05:50 +02:00
jsteube
94a35ae50a
Add support for hooks in selftest function
2017-06-14 12:07:33 +02:00
Jens Steube
08fc0ec1fb
Added self-test funcionality for OpenCL kernels on startup
...
Fixed a parser error for mode -m 9820 = MS Office <= 2003 $3, SHA1 + RC4, collider #2
2017-06-13 19:07:08 +02:00
Jens Steube
7e5b8d3f25
Added hash-mode 15500 = JKS Java Key Store Private Keys (SHA1)
2017-06-09 09:56:06 +02:00
Jens Steube
9d49ae547b
Merge pull request #1271 from DoZ10/chacha20
...
Chacha20: Fixed error in format parser separator validation
2017-06-08 19:15:25 +02:00
DoZ10
e6c549e4a0
Complied with other parsers coding style
2017-06-07 08:28:13 -04:00
DoZ10
531473cc72
Fix. Added undef INVALID_SEPARATOR_POINTER
2017-06-06 13:29:50 -04:00
DoZ10
990a72affe
Fixed error in separator check
2017-06-06 13:26:10 -04:00
Royce Williams
b9d68d2377
$chacha20$ (all lower case) per @magnumripper
2017-06-06 04:51:32 -08:00
Chick3nman
a973d4b94b
Fixed mode 9810/9820 labeling
...
Removed $4 from label to avoid confusion.
2017-06-06 03:09:50 -05:00
jsteube
b8ad89c529
Rename function and variables containing 'unicode' to 'utf16le' because that's what's meant actually
2017-06-05 12:15:28 +02:00
Royce Williams
3fc185a66b
tidy changes.txt and name normalizations
2017-06-04 13:54:41 -08:00
jsteube
018bb208d9
Refactor OPTS_TYPE_PT_UNICODE -> OPTS_TYPE_PT_UNICODE_LE and add OPTS_TYPE_PT_UNICODE_BE
2017-06-04 22:46:05 +02:00
Jens Steube
3d888b6b2d
it's possible to crack scrypt on GPU even with higher scrypt setting
...
the trick is to intentionally under-utilize the GPU warps
120H/s on my 4*1080: https://pastebin.com/z124G2cN
2017-06-04 15:49:09 +02:00
Jens Steube
b23ab71d5c
- Added hash-mode 15600 = Ethereum Wallet, PBKDF2-HMAC-SHA256
...
- Added hash-mode 15700 = Ethereum Wallet, PBKDF2-SCRYPT
Resolves https://github.com/hashcat/hashcat/issues/1227
Resolves https://github.com/hashcat/hashcat/issues/1228
2017-06-03 23:23:03 +02:00
Fist0urs
f8c3fecec3
interface.c: dpapimk_parse_hash, fix signed/unsigned comparison
2017-05-19 14:49:42 +02:00
Jens Steube
f2ad095191
Merge pull request #1237 from DoZ10/master
...
New algorithm: Chacha20
2017-05-18 13:51:47 +02:00
philsmd
af3619f3c5
-m 11600 = 7zip: do not allow truncated hashes anymore, but increase supported data length to ~320KB
2017-05-17 15:07:16 +02:00
philsmd
aa14b4ec9e
for -m 11600 = 7zip we need to remove special case, since the padding attack is now gone
2017-05-17 14:15:13 +02:00
philsmd
1f93d2060f
fixes #1239 : remove AES padding attack for 7zip since we can't guarantee that the padding is always zero
2017-05-17 13:53:55 +02:00
DoZ10
5683df2e17
Fixed conflicts
2017-05-16 20:36:55 -04:00
DoZ10
8b6120243d
Applied performance changes and fixed multi-mode bad implementation
2017-05-16 19:59:46 -04:00
DoZ10
264ec951c2
Enhanced test.pl for 15400 and removed endianess confusion
2017-05-15 19:21:49 -04:00
DoZ10
8dfd1bf066
Final. Implemented offset parameter to reach next keystream in kernels. Tested all kernels with scalar and vector modes
2017-05-15 18:34:34 -04:00
DoZ10
cfc3fa64c0
Implemented offset parameter to reach full ks block of 64 bytes
2017-05-15 08:47:40 -04:00
Fist0urs
a78dce94db
All remarks treated:
...
1) done + got rid of all u8 datatypes in shared struct
2) cf. previous
3) necessary as this is computed in _init then used in _comp
4) done
5) done
6) done => switch to 16
7) done
2017-05-14 19:45:35 +02:00
DoZ10
f0842f6d17
Implemented size and hex checks in interface.c
2017-05-14 07:32:33 -04:00
DoZ10
9dee1d274d
Removed plain_length parameter and copied esalt buffer to salt ofr sorting mechanism.
2017-05-14 07:14:57 -04:00
DoZ10
0d3b5393ef
Swapped mode 670 -> 15400
2017-05-14 06:52:14 -04:00
DoZ10
9c311091d0
Fixed pw_max to 32
2017-05-09 21:31:07 -04:00
Fist0urs
7ff09c6710
Preparing PR
2017-05-09 20:14:07 +02:00
DoZ10
a208007d9d
Removed forgotten comment.
2017-05-08 20:04:58 -04:00
DoZ10
c50e8bc486
Fixed position parameters. Tested all kernels. Ok.
2017-05-07 14:02:00 -04:00
DoZ10
3c67e0054c
Implemented Perl test and fixed issues. Now have a working base.
2017-05-06 20:40:10 -04:00
DoZ10
cd9dc989ce
Implemented Chacha20 crypto.
2017-05-06 14:24:50 -04:00
Fist0urs
40bbb0023c
Merge branch 'master' of https://github.com/hashcat/hashcat into DPAPImk
2017-05-06 17:00:17 +02:00
Fist0urs
d537712f27
Both DPAPImk v1 and v2 work for single hash, still a bug on multi-hash
...
Remaining this bug + tests.pl before PR
2017-05-06 16:55:36 +02:00
DoZ10
fb86f89f63
Fixed print output endianess in interface.c
2017-05-05 09:23:14 -04:00
DoZ10
f6cd42352d
CPU parsing mostly done. Kernel showing good values.
2017-05-05 09:02:18 -04:00
DoZ10
152f0b5152
Init work on Chacha20
2017-05-04 22:34:52 -04:00
Fist0urs
29d331ee17
hmac-sha1 + SID almost working, padding problem
2017-05-02 23:56:00 +02:00
DoZ10
31fbe481fa
Fixed final details
2017-05-02 07:17:29 -04:00
DoZ10
9d0855c02f
Fixed interface.c to remove XORing madness and blake2_t naming convention
2017-05-01 16:38:48 -04:00
Fist0urs
014278ab0e
Working:
...
- MD4/sha1
- hmac-sha1
- pbkdf2-hmac-sha1
- pbkdf2-hmac-sha512
Remaining:
- handling of long salt (SID)
- (AES256/DES3) + the end
2017-05-01 22:21:54 +02:00
DoZ10
98b9e38d54
Fix for app compilation error on mingw
2017-04-30 21:31:51 -04:00
DoZ10
87e0281237
Moved init params in CPU (interface.c). Fixed vector-type problem in kernel a0.
2017-04-30 20:34:01 -04:00
Fist0urs
73d48dcd26
Initial commit, new format DPAPImk, works till hmac-sha1
2017-05-01 00:48:09 +02:00
DoZ10
e71c68e0af
Fixed endianness to remove unecessary kernel swaps ops
2017-04-29 22:10:06 -04:00
DoZ10
58c1f46b19
Merge and conflict resolve.
2017-04-24 21:47:35 -04:00
DoZ10
e23f88fec8
Fixed Test files to match output. $Blake2$ Tag added to interface hash output
2017-04-23 10:28:58 -04:00
DoZ10
a60cddc2cc
Added Blake2 signature according for JtR format.
2017-04-22 07:35:22 -04:00
DoZ10
f56ffdc32f
Removed OPTS_TYPE_ST_ADDBITS15
2017-04-20 19:17:36 -04:00
DoZ10
3cc681989c
fix: changed salt configuration.
2017-04-20 19:09:03 -04:00
DoZ10
afdef5ce1c
fix: Kernel m00600_a3.cl function s04.
2017-04-19 13:27:28 -04:00
DoZ10
c2af1e7c5c
undo: debug
2017-04-16 11:55:21 -04:00
DoZ10
c0cedbf15f
add: now target hash is okay.
2017-04-16 11:28:06 -04:00
DoZ10
d5ca5d59db
add: lots of things....
2017-04-16 10:07:12 -04:00
Jens Steube
26a345334f
Added hash-mode 15200 = Blockchain, My Wallet, V2
...
Fixes https://github.com/hashcat/hashcat/issues/109
2017-04-16 13:19:23 +02:00
Jens Steube
e3cef832be
Use the ROUNDS_MYWALLET instead of a hard-coded value
2017-04-16 12:47:14 +02:00
DoZ10
69dad31a29
fix: changed -m 6200 -> 600
2017-04-13 20:45:48 -04:00
DoZ10
25e061ce1c
fix: syntax bug..
2017-04-13 20:26:21 -04:00
DoZ10
0a8f17c24a
fix: g madness...
2017-04-13 17:33:08 -04:00
DoZ10
bf45f87d39
random work...
2017-04-13 17:06:48 -04:00
DoZ10
4e9bb8b093
init
2017-04-13 08:38:59 -04:00
sgroat
21efc80975
fix string
2017-04-10 13:35:01 -07:00
Royce Williams
b668aa2a81
label for 5700 Cisco type 4; update readme.txt
2017-04-04 05:14:08 -08:00
Royce Williams
4a393cacf6
5800 is Samsung only
2017-04-04 05:03:01 -08:00
Royce Williams
8620e4113f
a few minor hash-mode name fixes
2017-04-03 06:55:35 -08:00
Royce Williams
46b83926fa
clarify and standardize hash-mode names
2017-04-03 00:16:56 -08:00
Royce Williams
067372f5ce
more event_log_* standardization
2017-04-01 23:50:06 -08:00
jsteube
d1b2fa0b31
Added hash-mode 15100 = Juniper/NetBSD sha1crypt
2017-03-23 16:44:32 +01:00
philsmd
d60d6f9625
fix for previous commit: make sure that we do not override the hccapx structure values
2017-03-22 12:53:50 +01:00
philsmd
07c748e136
fixes #1199 : introduce special bit (8) in message_pair (HCCAPX) to indicate if replay counter match
2017-03-22 12:09:15 +01:00
jsteube
a30a9f5b45
Fixed a hash validation error when trying to load Android FDE < 4.3 hashes
2017-03-21 14:07:16 +01:00
jsteube
c04dd5c8b1
WPA cracking: Added support for WPA/WPA2 handshake AP nonce automatic error correction
...
WPA cracking: Added parameter --nonce-error-corrections to configure range of error correction
2017-03-07 14:41:58 +01:00
jsteube
33a043ec63
Refactored internal use of esalt from sync with number of salts to sync with number of digests
...
This enables a true N esalts per salt feature which is required for WPA/WPA2 handling
In case we need that for a future algorithm, just make sure to have a unique value in digest in hash parser.
Fixes https://github.com/hashcat/hashcat/issues/1158
2017-03-07 09:44:58 +01:00
philsmd
a2708e1063
fixes #1160 : parsing/displaying -m 7000 = Fortigate hashes
2017-03-05 17:14:55 +01:00
philsmd
522c047860
min pass length init: typo fixed
2017-03-04 20:02:47 +01:00
philsmd
22d1129818
added -m 12001 = Atlassian (PBKDF2-HMAC-SHA1) #611
2017-02-28 14:22:03 +01:00
jsteube
c47f9d4b3e
Fix a bug in wpa_essid_reuse_next() destroying reuse PBKDF2 intermediate keys if duplicate essid logic
2017-02-28 10:20:46 +01:00
Jens Steube
e82ce9243d
Added support for filtering hccapx message pairs using --hccapx-message-pair
2017-02-27 12:09:49 +01:00
Jens Steube
0fc949ef69
Fixed cracking of PeopleSoft Token if salt length + password length is >= 128 byte
2017-02-27 11:06:53 +01:00
jsteube
d2e95d5e1b
Fix WPA/WPA2 incorrectly reports cracked passwords in some cases
2017-02-27 09:30:02 +01:00
jsteube
dc170907ed
Compress multiple newlines to one in host code, too
2017-02-26 15:48:14 +01:00
jsteube
f381b107a3
Remove some unused variable
2017-02-23 12:15:19 +01:00
jsteube
7797826c8d
Continue with WPA hashing logic as it was already
2017-02-23 09:46:26 +01:00
jsteube
d8e056d59f
Also add WPA keymic to parser hash
2017-02-23 00:49:12 +01:00
jsteube
9b08d4af0f
Update hccapx format to version 4
2017-02-21 20:07:18 +01:00
Jens Steube
2dd027af65
Make sure to zero scratch buffer for WPA/WPA2 and LUKS
2017-02-21 13:09:00 +01:00
Jens Steube
dd55c1eb66
WPA: Changed format for outfile and potfile from essid:mac1:mac2 to hash:mac_ap:mac_sta:essid
...
Fixes https://github.com/hashcat/hashcat/issues/1113
2017-02-19 14:45:27 +01:00
jsteube
ef004e85f0
Fix some variable initializationg warnings in older GCC
2017-02-16 10:10:38 +01:00
philsmd
12517f1b7a
typo: don't add URI_prefix_len and URI_suffix_len twice
2017-02-15 11:50:35 +01:00
philsmd
02480f906a
prevent buffer overflow in case of OPTS_TYPE_ST_ADD80 and/or OPTS_TYPE_ST_ADD01
2017-02-15 11:33:52 +01:00
philsmd
0993f2e748
fixed maximum salt_len for pbkdf2 buffers
2017-02-14 22:05:47 +01:00
philsmd
54915e4d7b
minor: do not use UINT_MAX as upper bound for the salt_len
2017-02-14 21:54:49 +01:00
philsmd
f351461ecd
max esalt_buf for sip fixed: we also need to append 0x80
2017-02-14 21:45:18 +01:00
jsteube
be3ce44f75
Fix CID 1402444 ( #1 of 1): Out-of-bounds read
2017-02-14 21:40:11 +01:00
philsmd
f535eb2bd0
always check the input for NULL before the strtok_r () calls
2017-02-14 20:46:03 +01:00
philsmd
12047861c5
also double-check input/output of strtok_r ()
2017-02-14 20:07:49 +01:00
philsmd
a82f6fb77c
our usage of strtok_r () was not totally correct (but almost)
2017-02-14 19:48:07 +01:00
philsmd
e5ecbb9a59
minor: within parse_and_store_salt () do the initialization of the buffer at the very start
2017-02-14 19:30:36 +01:00
philsmd
05f8abdbe7
minor: useless code (since we removed the swaps)
2017-02-14 19:17:45 +01:00
philsmd
7818712090
minor: check for return value of sscanf () within the zip2 parse function
2017-02-14 18:58:25 +01:00
philsmd
9efc429928
dead code: in office parse functions
2017-02-14 18:49:35 +01:00
philsmd
4eadbf221e
dead code: already implied length within the android fde parsing function
2017-02-14 18:25:20 +01:00
philsmd
8fa361dffa
dead code: already implied length within the android fde parsing function
2017-02-14 18:22:46 +01:00
philsmd
d366a93bb3
we always need to check for NULL after strchr ()
2017-02-14 17:54:18 +01:00
philsmd
49ba6cb05d
-m 13100 = Kerberos 5 TGS-REP: parser failed to correctly verify the hash
2017-02-14 17:45:05 +01:00
philsmd
6915bfad8b
keyfiles: for VeraCrypt/TrueCrypt keyfiles we need to free the memory in case of errors
2017-02-14 17:32:39 +01:00
philsmd
23368c7304
fix: added additional fclose () whenever an hash parsing error occurs
2017-02-14 17:22:52 +01:00
philsmd
553eddad49
-m 11400 = SIP digest authentication (MD5): added bound checks in parser
2017-02-14 15:58:44 +01:00
philsmd
67a8584f7c
precompute_salt_md5: don't allow a salt_len > 64
2017-02-14 15:27:31 +01:00
philsmd
0771a8e36a
fix: we should initialize the aes_key in seven_zip_hook_func ()
2017-02-14 11:10:33 +01:00
jsteube
63b7321be2
Fixed WPA/WPA2 cracking in case eapol frame is >= 248 byte
2017-02-13 18:31:15 +01:00
jsteube
9c5cfd17ac
Added support for automatic merge of LM halfes when --show and --left is used
...
Fixes https://github.com/hashcat/hashcat/issues/1034
2017-02-13 16:46:37 +01:00
philsmd
227c0be95e
resolves #1018 : added -m 3910 = md5(md5($pass).md5($salt))
2017-02-12 18:12:17 +01:00
Rosen Penev
a3d04a40b0
Fix more cppcheck warnings
2017-02-10 16:10:21 -08:00
jsteube
9aabc20248
Add a warning message if old hccap file is detected and abort
2017-02-08 20:25:04 +01:00
jsteube
5b922a6b8d
Fix for https://github.com/hashcat/hashcat/issues/1029
2017-02-07 16:23:42 +01:00
jsteube
717da7f4f2
Added support for loading hccapx files
2017-02-06 17:03:42 +01:00
philsmd
15a9644f2a
fixes #943 : added -m 15000 = FileZilla Server >= 0.9.55
2017-02-03 00:07:31 +01:00
philsmd
fe6309caa7
fixes #398 : added -m 4110 md5($salt.md5($pass.$salt))
2017-02-01 19:56:49 +01:00
philsmd
8e689058d0
#398 : add -m 4010 = md5($salt.md5($salt.$pass))
2017-02-01 16:56:14 +01:00
jsteube
2135ea3329
WPA: Changed format for outfile and potfile from essid:mac1:mac2 to hash:essid
...
WPA: Changed format for outfile_check from essid:mac1:mac2 to hash
2017-02-01 12:25:21 +01:00
philsmd
ed74ce1aca
fixes #928 : new mode -m 1411 = SSHA-256(Base64), LDAP {SSHA256}
2017-01-31 12:40:43 +01:00
jsteube
e0c3f447da
Added hash-mode 4520 = sha1($salt.sha1($pass))
...
Added hash-mode 4522 = PunBB
OpenCL Kernel: Renumbered hash-mode 7600 to 4521
The mode 4520 is the first to support salt length up to 64
2017-01-31 11:44:58 +01:00
philsmd
96e312ccb6
fixes #537 : added -m 7000 = Fortigate (FortiOS)
2017-01-30 21:18:37 +01:00
jsteube
1b8c2a29f1
Added hash-mode 14900 = Skip32
2017-01-29 16:43:08 +01:00
Jens Steube
07c89833c9
Added hash-mode 14800 = iTunes Backup >= 10.0
2017-01-26 21:16:29 +01:00
philsmd
78fc0e87bd
minor: we actually could/should omit the use of wpky_buf_ptr here
2017-01-25 20:08:41 +01:00
philsmd
7660b06e1c
minor: changed grouping of byte_swap_32 () and u32_to_hex_lower () for -m 14700
2017-01-25 19:56:34 +01:00
philsmd
0201d89099
fixed offset for dpsl buffer
2017-01-25 19:44:13 +01:00
philsmd
9327475b41
added -m 14700 = iTunes Backup < 10.0
2017-01-25 19:07:07 +01:00
philsmd
2bf49d424c
-m 11600: additional check for padding attack in case of unsupported coder
2017-01-24 16:32:31 +01:00
philsmd
2845f0e716
-m 11600: additional check for padding attack in case of unsupported coder
2017-01-24 16:28:00 +01:00
philsmd
b22b2012b8
-m 11600: allow hashes with compressions different from LZMA1/LZMA2
2017-01-24 16:11:47 +01:00
philsmd
297c797521
hook code: refactored the hook salt to be part of the hash_t struct
2017-01-24 15:23:48 +01:00
philsmd
6fe0173a79
#965 : new hook function to support LZMA1/LZMA2 decompression for -m 11600 = 7-Zip
2017-01-24 10:28:35 +01:00
jsteube
8d6170d66e
Simply do not use __builtin_bswap16() this causes all kinds of problems, use our own implementation
2017-01-21 18:23:11 +01:00
jsteube
53d467abf8
Fix travis-ci error caused by __builtin_bswapXX()
2017-01-21 18:03:47 +01:00
jsteube
8257883ec1
Added hash-mode 14600 = LUKS
2017-01-21 15:37:44 +01:00
philsmd
98fee66486
-m 11600 = 7-Zip: added support for parsing $7z$1... and $7z$2... hashes
...
Attention: the LZMA/LZMA2 decompression step still needs to be implemented (e.g. via a hook)
2017-01-12 20:28:16 +01:00
Jens Steube
e01ccb9e81
Fixed plaintext cracking mode, used invalid offset
2017-01-05 22:55:53 +01:00
Jens Steube
e3ad2f9b7d
Fixed buffer overflow in plaintext parsing code: Leading to segfault
2017-01-05 17:39:14 +01:00
jsteube
ad42dd59ac
Fixed hash-mode 11400 = SIP digest authentication (MD5): Cracking of hashes which did not include *auth* or *auth-int* was broken
2017-01-05 16:14:12 +01:00
Jens Steube
0cdf929ab2
Fix -m 9720 byte swaps
2016-12-30 17:21:27 +01:00
Jens Steube
d259f96790
Fix -m 10600 and -m 10700 parser
2016-12-26 15:58:01 +01:00
jsteube
514fc0fe75
Switch hex_to_u32() to LE
...
Also fixes -m 11100 is_valid_hex_string()
2016-12-26 15:09:56 +01:00
jsteube
ceed66d50b
Switch hex_to_u64() to LE
2016-12-26 13:09:41 +01:00
jsteube
f0b287e838
Get rid of bin_to_hex_lower(), add u8_to_hex_lower(), u32_to_hex_lower() and u64_to_hex_lower()
2016-12-26 12:52:06 +01:00
jsteube
fa5b5d298d
Hash Parser: Improved error detection of invalid hex characters where hex character are expected
2016-12-23 14:57:46 +01:00
jsteube
72af615e8b
WPA cracking: Reuse PBKDF2 intermediate keys if duplicate essid is detected
2016-12-22 02:17:49 +01:00
Gabriele Gristina
8b0764bc4d
Add support for SHA-224
2016-12-16 02:05:12 +01:00
jsteube
f218e85c4d
Fix -m 7300 hash output from ascii_digest()
2016-12-01 17:28:19 +01:00
Rosen Penev
4d09cc10fd
Fix some formats and conversion errors
2016-11-30 15:14:42 -08:00
jsteube
cad3b3e10b
Get rid of truecrypt_mdlen
2016-11-30 11:41:31 +01:00
jsteube
66a9f2f544
Merge strcmp() changes from https://github.com/hashcat/hashcat/pull/604
2016-11-21 11:36:49 +01:00
jsteube
ea4fd1de50
Remove complicated checks after memory allocation and in case of error print to stderr instead. This makes the memory allocation functions more natural to use.
2016-11-20 22:54:52 +01:00
jsteube
c8daffb4b6
Fix some unreachable code
2016-11-20 22:11:33 +01:00
jsteube
5c871d5322
Initialize psafe3 header even if later overwritten by fread() to make scan-build happy
2016-11-20 21:49:16 +01:00
jsteube
7388c032a8
Remove some useless calls which helped understanding the code logic to make scan-build happy
2016-11-20 21:38:17 +01:00
jsteube
7f1dbf5a33
Fix too late check of fread() return in interface.c
2016-11-20 13:53:33 +01:00
jsteube
e8078f2c73
Add output buffer size to ascii_digest()
2016-11-19 16:10:01 +01:00
Rosen Penev
03efea645f
More sign fixes
2016-11-16 21:17:28 -08:00
Rosen Penev
4e82eb9281
Replace atoi with atoll. Eliminates sign conversion warnings
2016-11-16 20:43:17 -08:00
Rosen Penev
c13ef5aacd
Fix formats found by cppcheck
2016-11-16 20:30:14 -08:00
jsteube
d5375a4818
Fix some code in interface.c to make cppcheck happy
2016-11-16 15:36:06 +01:00
jsteube
536dcef7eb
Replaced all calls to strtok() with strtok_r() to ensure thread safety
2016-11-16 10:35:01 +01:00
jsteube
5623087048
Remove unused function md4s_parse_hash() from interface.c
2016-11-16 10:10:12 +01:00
Rosen Penev
22abb22c13
Fix a few printf formats
2016-11-13 17:45:36 -08:00
jsteube
0e9ef5313d
Optimize salt initialization in ascii_digest()
2016-11-12 16:07:42 +01:00
jsteube
d4a7cbf101
Fix uninitialized salt buffer in ascii_digest()
2016-11-12 16:03:52 +01:00
jsteube
17d2726c24
Comment out some unused code but do not remove it to keep up the logic of the code visible
2016-11-12 15:56:51 +01:00
jsteube
5835f0991f
Improved NSEC3 hashes parsing error detection
2016-11-12 12:50:02 +01:00
jsteube
2bda020c83
Added new hash-mode 14400 = SHA1(CX)
...
Details: https://github.com/hashcat/hashcat/issues/554
2016-11-12 11:39:38 +01:00
jsteube
1c8847499d
Fix -i loop if mask is shorter than increment_max or pw_max
2016-11-07 11:17:05 +01:00
jsteube
2507f62722
Add hash-mode option OPTS_TYPE_PT_ALWAYS_ASCII to control need_hexify() from interface.c
2016-11-05 14:46:00 +01:00
jsteube
f3626fa082
Added new hash-mode 99999 = Plaintext
2016-11-03 19:02:55 +01:00
jsteube
5b69620a35
Do not use sizeof() on a pointer address
2016-11-02 23:40:14 +01:00
jsteube
93adde9d2f
* Wrap everything related to *stat() into own functions
...
* Testwise remove early includes to stdin for OSX, see if they are still required
2016-10-31 11:28:06 +01:00
jsteube
6d2ce0d71a
Added option --keep-guessing to continue cracking hashes even after they have been cracked.
...
It will be useful if there are multiple collisions and we want a specific one.
This one implements https://github.com/hashcat/hashcat/issues/493
2016-10-31 10:09:04 +01:00
jsteube
b8efae4281
Refactor all variables with HCBUFSIZ_LARGE size from stack to heap
2016-10-30 22:47:48 +01:00
jsteube
9f790d4dbd
Move u8 * instead of char * for most interface.c functions
2016-10-30 21:56:56 +01:00
jsteube
7eef713ff7
Fix compiler warnings caused by -Wshadow
2016-10-30 20:37:02 +01:00
Gabriele Gristina
3afa29bcff
Cleanup src/interface.c code
2016-10-30 15:22:25 +01:00
jsteube
df8a9ab5e5
Support mixed kernel thread count for mixed kernels in the same source file
...
Get rid of one global kernel_threads variable
Recognize reqd_work_group_size() values from OpenCL kernels and use them in host if possible
Fix some white spaces
Remove unused weak* kernels
Rename hashconfig_enforce_kernel_threads() to hashconfig_get_kernel_threads() - we do not enforce anymore
Rename hashconfig_enforce_kernel_loops() to hashconfig_get_kernel_loops() - we do not enforce anymore
Add some missing checks for --quiet
2016-10-29 14:02:29 +02:00
jsteube
39eed94703
Add option OPTS_TYPE_BINARY_HASHFILE for interface.c
2016-10-27 00:32:38 +02:00
jsteube
e4b3ea937f
Fix salt length for -m 22 in benchmark mode
2016-10-19 16:52:41 +02:00
jsteube
8598a79732
Removed exit() from memory.c, resulting in all exit() calls removed from all code in the repository
2016-10-13 10:07:04 +02:00
jsteube
af9de0a7b7
Fix some error string formats
2016-10-11 10:55:02 +02:00
jsteube
8fc4da795b
Replace fprintf(stderr, ...) on malloc.c with log_event_error()
2016-10-10 11:03:11 +02:00
jsteube
0f96c57ead
Remove some workarounds to use get rid of unused variable warnings
2016-10-10 09:12:36 +02:00
jsteube
27bec8be13
Get rid of logging.c and most exit() calls replaced with return() for true library usage
2016-10-09 22:41:55 +02:00
jsteube
fa4de96ab0
switch cpu_crc32.c to event_log_*
2016-10-08 23:53:52 +02:00
jsteube
bea228dabe
Add straight_ctx_update_loop()
2016-10-06 22:18:20 +02:00
jsteube
a97e31881c
Update interface.c function parameters
2016-10-06 15:49:07 +02:00
jsteube
935e4a6fa0
Fix loading of NetNTLMv1 + SSP hash
2016-10-05 14:33:36 +02:00
coolbry95
a78fd4e915
changed uint to u32
2016-10-04 00:35:49 -04:00
jsteube
fb5d840cf8
Move wordlist folder scan to straight.c and combinator.c init functions
2016-10-03 16:27:34 +02:00
jsteube
9413ed8f56
Centralize hashcat_ctx memory allocation and deallocation
2016-10-02 00:00:21 +02:00
jsteube
3203ad4e89
Fixed win8phone_t type in interface.c
2016-10-01 14:06:47 +02:00
jsteube
92625b7692
Fix WPA benchmark default mask
2016-09-28 23:14:08 +02:00